US12058108B2 - Sharing of firewall rules among multiple workloads in a hypervisor - Google Patents
Sharing of firewall rules among multiple workloads in a hypervisor Download PDFInfo
- Publication number
- US12058108B2 US12058108B2 US17/723,191 US202217723191A US12058108B2 US 12058108 B2 US12058108 B2 US 12058108B2 US 202217723191 A US202217723191 A US 202217723191A US 12058108 B2 US12058108 B2 US 12058108B2
- Authority
- US
- United States
- Prior art keywords
- firewall
- rules
- rule
- host computer
- firewall rules
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
- 238000000034 method Methods 0.000 claims abstract description 27
- 230000008569 process Effects 0.000 claims description 9
- 230000009471 action Effects 0.000 description 8
- 238000007726 management method Methods 0.000 description 8
- 238000004590 computer program Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000007792 addition Methods 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 238000013500 data storage Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 239000000284 extract Substances 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/901—Indexing; Data structures therefor; Storage structures
- G06F16/9024—Graphs; Linked lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0263—Rule management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
- G06F2009/45587—Isolation or security of virtual machine instances
Definitions
- a distributed firewall may be distributed across the multiple workloads on the host and enforce rules close to the source of traffic for the workloads.
- Each individual workload may have its own copy of firewall rules that are stored in the hypervisor kernel to enforce different policies, such as a security policy.
- multiple workloads on the same hypervisor have some common firewall rules in their own copy of the rules. This may be because the workloads are executing similar functionality on the same hypervisor. For example, a company may put workloads that are performing the same or similar functions on a single host. Even though there are common firewall rules, the distributed firewall stores a separate set of firewall rules for each workload. This consumes a large amount of memory in the hypervisor, which may limit the number of firewall rules that a hypervisor can support.
- FIG. 1 depicts a simplified system for implementing a distributed firewall according to some embodiments.
- FIG. 2 depicts a simplified flowchart of a method for processing firewall rules according to some embodiments.
- FIG. 3 A shows an example of a rules table according to some embodiments.
- FIGS. 3 B to 3 D depict examples of index tables according to some embodiments.
- FIG. 4 depicts a simplified flowchart of a method for processing packets using a firewall according to some embodiments.
- a hypervisor on a host computing device receives a copy of firewall rules for a group of workloads running on that hypervisor.
- the hypervisor may store a single copy of the firewall rules in the hypervisor for the group.
- Each workload may have an associated set of firewall rules where different workloads may apply a different set of firewall rules.
- the hypervisor stores a list of references to the firewall rules in an index table for each workload.
- the index table includes references to rules in a rules table.
- a first index table for a first workload may include a first set of references that reference a first set of rules in the rules table and a second index table for a second workload may include a second set of references that reference a second set of rules in the rules table.
- the first set of references and the second set of references may include different references to rules, such as the first set of references may reference rules R1, R2, and R3, and the second set of references may reference rules R1, R3, and R5.
- index tables allow the hypervisor to save memory. For example, storing only a single copy of the rules for the firewall rules used by the group of workloads eliminates the memory needed to store a distinct copy of firewall rules for each workload. Storing an index table for each workload may use a much smaller amount of memory than storing the distinct copy of rules for each workload. Using less memory provides some advantages, such as the use of less memory to store distinct copies of rules for each workload may allow the hypervisor to store a larger amount of rules in the rules table.
- FIG. 1 depicts a simplified system 100 for implementing a distributed firewall according to some embodiments.
- Hosts 102 may include workloads 106 - 1 to 106 -N.
- Workloads may refer to virtual machines that are running on a respective host, but this is one example of a virtualized computing instance or compute node. Any suitable technology may be used to provide a workload.
- Workloads may include not only virtual machines, but also containers (e.g., running on top of a host operating system without the need for a hypervisor or separate operating system or implemented as an operating system level virtualization), virtual private servers, client computers, etc.
- the workloads may also be complete computation environments containing virtual equivalents of the hardware and software components of a physical computing system.
- the term hypervisor may refer generally to a software layer or component that supports the execution of multiple workloads including system-level software that supports name space containers.
- Workloads 106 - 1 to 106 -N may send and receive packets through virtual network interface cards (VNIC) 116 - 1 to 116 -N.
- the packets may be sent through a virtual switch 112 in hypervisor 104 to a physical network interface card (PNIC) in hardware 114 . Then, packets are routed through physical network 120 . Also, packets are received from physical network 120 at the PNIC, and sent through virtual switch 112 to VNICs 116 of workloads 106 .
- VNIC virtual network interface cards
- PNIC physical network interface card
- Management platform 118 may be a platform that manages the virtual networks on host computing machines 102 .
- management platform 118 may centrally manage firewall rules that are distributed to different hosts 102 .
- a local controller plane (LCP) 120 may be a process that is running on hypervisor 104 .
- LCP 120 receives the firewall rules for workloads 106 from management platform 118 .
- LCP 120 interacts with management platform 118 to retrieve the firewall rules.
- LCP 120 is running in the user space of hypervisor 104 ; however, the implementation of LCP 120 may be different.
- LCP 120 processes the firewall rules to build rules table 124 and index tables 126 - 1 to 126 -N, the processing of which will be described in more detail below.
- Firewall manager 122 manages the configuration of the distributed firewall in hypervisor 104 .
- firewall manager 122 stores a central copy of all firewall rules in the memory of hypervisor 104 , such as in a rules table 124 .
- rules table 124 The structure and use of rules table 124 will be described in more detail below.
- LCP 120 and firewall manager 122 are described as being separate components, other configurations may be used, such as functions of both may be combined or distributed to other entities.
- firewalls 110 - 1 to 110 -N are configured for each respective workload 106 - 1 to 106 -N.
- each instance of distributed firewall 110 may be enforced in between VNIC 116 and virtual switch 112 .
- firewall 110 may be situated at any point in a path of packets, such as at VNIC 116 , or anywhere in between workload 106 and virtual switch 112 .
- Firewall 110 intercepts packets sent from VNIC 116 before they reach virtual switch 112 and also intercepts packets from virtual switch 112 before they reach VNIC 116 .
- Each respective workload 106 may have an associated firewall situated between VNIC 116 and virtual switch 112 although firewalls 110 may be placed at other positions.
- Firewalls 110 - 1 to 110 -N store index tables 126 - 1 to 126 -N, respectively. Each index table 126 references specific firewall rules that apply to the respective workload 106 . Those references are used to retrieve rules in rules table 124 when enforcing policies at firewalls 110 . The structure of index table 126 and enforcement of policies will be described in more detail below.
- Management platform 118 may distribute a copy of firewall rules for a group of workloads 106 running on hypervisor 104 of a host 102 .
- the copy of firewall rules is for all workloads 106 running on hypervisor 104 .
- management platform 118 may provide different groups of firewall rules for groups of workloads 106 that are running on hypervisor 104 . For example, a first group of workloads 106 on host 102 may have an associated first copy of firewall rules and a second group of workloads 106 on host 102 may have a second copy of firewall rules.
- LCP 120 receives and processes the firewall rules for workloads 106 from management platform 118 .
- LCP 120 reviews the rules and can generate index tables that reference each rule that is associated with a specific workload 106 .
- FIG. 2 depicts a simplified flowchart 200 of a method for processing firewall rules according to some embodiments.
- LCP 120 receives rules and information on which workloads to apply to the rules.
- LCP 120 may receive only one copy of the all the rules.
- LCP 120 generates a rules table 124 that stores the rules.
- Rules table 124 may be a data structure, such as an index that refers to information for each of the firewall rules.
- FIG. 3 A shows an example of a rules table according to some embodiments.
- a first column 302 may be an index and a second column 304 may store the information for the rule.
- the indices include #1, #2, . . . , #5 and there are five rules R1, R2, . . . , R5.
- the information for the rules may be stored in each entry in rules table 124 for each rule. For example, information for rule R1 is stored for index #1; the information for rule R2 is stored for index #2, etc.
- the information for the rules may be stored in different formats.
- each rule may list any combination of information that can be used to apply the rule to a packet, such as a 5-tuple of a source Internet protocol (IP) address, a destination IP address, protocol used, a layer 4 (L4) source port, and a layer 4 destination port.
- IP Internet protocol
- L4 layer 4
- the 5-tuple may be stored in different columns, such as the source address is stored in a first column, the destination address is stored in a second column, etc.
- the information for the rules may also include an action to perform if the rule applies to a packet, such as “allow” or “block”. The allow action allows the packet to be sent or received by workload 106 and the block action does not send the packet from workload 106 or send the packet to workload 106 . Other actions may also be appreciated.
- LCP 120 selects a rule in the set of firewall rules. For example, the first rule R1 may be selected. Then, at 208 , LCP 120 determines workloads that are applied to that firewall rule.
- each rule may include a statement, such as an “apply to” statement that lists the workloads 106 in which the rules should be applied.
- Each workload 106 may be identified by a VNIC identifier and LCP 120 determines the VNIC identifier for each workload 106 in which the rule applies. Although VNIC identifiers are discussed, other identifying information for a workload may be used.
- the rules may be applied per datacenter, per a cluster of hosts, per a grouping of workloads, per a workload identifier, etc. Then, at 210 , LCP 120 adds a reference to each respective index table for the workloads for the rule.
- LCP 120 determines if another rule is found in the set of rules. If so, the process reiterates to 206 where another firewall rule is selected. The process continues to determine workloads associated with the new rule. LCP 120 then adds a reference to the rule to the respective index tables for the workloads. Once finished, each index table 126 may include a set of references that reference a set of rules in rules table 124 . Accordingly, when there are no more rules to analyze, at 214 , LCP 120 sends rules table 124 and index tables 126 - 1 to 126 -N to firewall manager 122 .
- FIGS. 3 B to 3 D depict examples of index tables 126 - 1 to 126 -N according to some embodiments. Rows of index tables 126 - 1 to 126 -N may list references to the rules. For example, in FIG. 3 B , for a workload 106 - 1 , index table 126 stores references to rules R1, R2, and R3. Referring to rules table 124 in FIG. 3 A , the indices for rules R1, R2, and R3 are #1, #2, and #3, respectively, and the indices may be used to retrieve the information for rules R1, R2, and R3 from rules table 124 . In FIG. 3 C , index table 126 lists references to rules R1, R3, and R5 for workload 106 - 2 .
- index table 126 lists the rules for workload 106 -N. These rules are R1, R2, and R4 and refer to the indices of #1, #2, and #4 in rules table 124 .
- the references may be a pointer or other information that points to an entry in rules table 124 .
- the reference for a rule includes less information than the information for the rule itself.
- Firewall manager 122 may be running in the kernel space of hypervisor 104 . Once receiving rules table 124 from LCP 120 , firewall manager 122 stores a copy of rules table 124 in the memory of hypervisor 104 . In some embodiments, firewall manager 122 stores a single copy of rules table 124 in hypervisor 104 for the group of workloads 106 .
- Firewall manager 122 then stores a copy of each respective index table 126 in a respective firewall 110 for each respective workload 106 .
- Each index table 126 - 1 to 126 -N may identify a specific workload 106 - 1 to 106 -N.
- each index table 126 may reference a VNIC identifier for a respective workload 106 .
- Firewall manager 122 uses the VNIC identifier for an index table 126 to store the index table for that firewall 110 .
- Each firewall 110 then has an associated index table 126 .
- firewall 110 - 1 includes an index table 126 - 1
- firewall 110 - 2 includes an index table 126 - 2 , and so on.
- logic for firewall 110 may be instantiated between VNIC 116 and a port of virtual switch 112 . The rules are stored with the instantiation of firewall 110 between VNIC 116 and the port of virtual switch 112 .
- firewalls 110 may process packets for workloads 106 .
- FIG. 4 depicts a simplified flowchart 400 of a method for processing packets using firewall 110 according to some embodiments.
- firewall 110 intercepts a packet that is being sent from workload 106 or is being sent to workload 106 , such as the packet is intercepted between VNIC 116 and virtual switch 112 .
- firewall 110 extracts one or more attributes for the packet.
- the attributes may be associated with characteristics of workload 106 , such as the 5-tuple described above; however, other combinations of attributes may be used.
- the attributes may be from different layers, such as attributes from layer 2 to layer 4.
- firewall 110 uses the references for the rules in index table 126 to access to the rules from rules table 124 and compares the attributes to the applicable rules in index table 126 to determine a rule that applies to the packet. For example, for workload 106 - 1 , firewall 110 retrieves references #1, #2, and #3 to rules R1, R2, and R3. Firewall 110 uses the references to access rules R1, R2, and R3 in rules table 124 . For example, information for rules R1, R2, and R3 are accessed at indices #1, #2, and #3 in rules table 124 .
- Firewall 110 may access rules from rules table 124 in different ways.
- firewall 110 communicates with firewall manager 122 by sending the reference to firewall manager 122 , which retrieves the rule and sends information for the rule to firewall 110 .
- firewall 110 uses the reference to retrieve the applicable rule from rules table 124 without communicating with firewall manager 122 .
- Firewall 110 may use different methods to perform the comparison.
- firewall 110 enforces the rules from a top to bottom ordering. For each packet, firewall 110 checks the top rule listed in index table 126 before moving down to the subsequent rules listed in index table 126 . The first rule listed in index table 126 that matches the attributes is enforced using this policy. The last rule that is listed at the bottom of index table 126 may be a default rule that is enforced on the packet if no other rule has attributes that match the attributes of the packet. The default rule may not specify any particular attributes so that the default rule can match all packets.
- this top to bottom ordering policy is described, other methods may be used. For example, firewall 110 may determine all the rules that match the attributes and then select the one of the rules based on a ranking system.
- firewall 110 may start with a first rule R1 listed in index table 126 , access rule R1 in rules table 124 using the reference #1, and then compare the attributes of the packet to the attributes listed for rule R1.
- firewall 110 may access a source and destination from columns in rules table 124 , and compare the source and destination of the packet to the source and destination of the rule. If the attributes listed for rule R1 do not match the attributes of the packet, then firewall 110 proceeds to determine if attributes for rule R2 match the attributes of the packet. If the attributes for rule R2 do not match the attributes of the packet, then rule R3 is enforced as the default rule.
- firewall 110 determines an action for the rule.
- the rule may list an action to perform, such as an action of allow the packet or block the packet.
- firewall 110 performs the action on the packet, which could route the packet to workload 106 or to virtual switch 112 if the packet is allowed, or just block the packet from being sent from or to workload 106 .
- firewall 110 may use a connection table together with the firewall rules.
- a connection table may store network connections in a fast lookup data structure such like hash table. Each network connection may be a unique identifier, such as a 5-tuple, based on packet attributes. If the first packet of a connection is allowed by the firewall rules, firewall 110 inserts an instance of the connection into the connection table. The following packets in the same connection may be allowed as well.
- Firewall 110 may look up packets in the connection table before attempting to match the firewall rules. When a packet does not match any existing connections in the connection table, firewall 110 then compares the packet to the firewall rules in index table 126 .
- hypervisor 104 uses less memory to store the rules.
- hypervisor 104 may only store one copy of firewall rules R1 to R5, which uses memory to store five rules.
- workloads 106 - 1 to 106 -N may each have three applicable rules that are used totaling nine rules. If an individual copy of each rule is stored for workloads 106 - 1 to 106 -N, memory is used to store nine rules, which uses more memory than storing five rules.
- some embodiments eliminate the storage requirement for four rules in this example. For example, rule R1 does not need to be stored three times for workload 106 - 1 , 106 - 2 , and 106 -N.
- multiple copies of rule R2 do not need to be stored for workload 106 - 1 , 106 -N, and multiple copies of rule R3 do not need to be stored for workloads 106 - 1 and 106 - 2 .
- the storage of individual copies of rules for each workload 106 is replaced by index tables and the storage of index tables 126 use significantly less space than the storage for individual sets of the rules for each workload 106 because storing the indices to rules uses less storage than the content of the rules themselves.
- management platform 118 may update the firewall rules.
- LCP 120 receives a new copy of all the firewall rules for a group of workloads 106 that are running on hypervisor 104 . Then, LCP 120 recomputes index tables 126 - 1 to 126 -N for each workload 106 - 1 to 106 -N. Additionally, LCP 120 computes a new rules table 124 . LCP 120 then sends the new index tables 126 and new rules table 124 to firewall manager 122 . While LCP 120 generated the new index tables 126 and new rules table 124 , firewall manager 122 still uses existing index tables 126 - 1 to 126 -N and the existing rules table 124 .
- LCP 120 creates a new set of index tables 126 and rule table 124 to allow the distributed firewall to operate while the update is taking place.
- firewall manager 122 can switch from using the previous index tables to new index tables and from the previous rules table to the new rules table.
- the virtualization software can therefore include components of a host, console, or guest operating system that performs virtualization functions.
- Plural instances may be provided for components, operations or structures described herein as a single instance.
- boundaries between various components, operations and data stores are somewhat arbitrary, and particular operations are illustrated in the context of specific illustrative configurations. Other allocations of functionality are envisioned and may fall within the scope of the disclosure(s).
- structures and functionality presented as separate components in exemplary configurations may be implemented as a combined structure or component.
- structures and functionality presented as a single component may be implemented as separate components.
- Some embodiments described herein can employ various computer-implemented operations involving data stored in computer systems. For example, these operations can require physical manipulation of physical quantities—usually, though not necessarily, these quantities take the form of electrical or magnetic signals, where they (or representations of them) are capable of being stored, transferred, combined, compared, or otherwise manipulated. Such manipulations are often referred to in terms such as producing, identifying, determining, comparing, etc. Any operations described herein that form part of one or more embodiments can be useful machine operations.
- one or more embodiments can relate to a device or an apparatus for performing the foregoing operations.
- the apparatus can be specially constructed for specific required purposes, or it can be a general purpose computer system selectively activated or configured by program code stored in the computer system.
- various general purpose machines may be used with computer programs written in accordance with the teachings herein, or it may be more convenient to construct a more specialized apparatus to perform the required operations.
- the various embodiments described herein can be practiced with other computer system configurations including handheld devices, microprocessor systems, microprocessor-based or programmable consumer electronics, minicomputers, mainframe computers, and the like.
- one or more embodiments can be implemented as one or more computer programs or as one or more computer program modules embodied in one or more non-transitory computer readable storage media.
- the term non-transitory computer readable storage medium refers to any data storage device that can store data which can thereafter be input to a computer system.
- the non-transitory computer readable media may be based on any existing or subsequently developed technology for embodying computer programs in a manner that enables them to be read by a computer system.
- non-transitory computer readable media examples include a hard drive, network attached storage (NAS), read-only memory, random-access memory, flash-based nonvolatile memory (e.g., a flash memory card or a solid state disk), a CD (Compact Disc) (e.g., CD-ROM, CD-R, CD-RW, etc.), a DVD (Digital Versatile Disc), a magnetic tape, and other optical and non-optical data storage devices.
- the non-transitory computer readable media can also be distributed over a network coupled computer system so that the computer readable code is stored and executed in a distributed fashion.
Landscapes
- Engineering & Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Data Mining & Analysis (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims (18)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17/723,191 US12058108B2 (en) | 2019-03-13 | 2022-04-18 | Sharing of firewall rules among multiple workloads in a hypervisor |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/352,577 US11310202B2 (en) | 2019-03-13 | 2019-03-13 | Sharing of firewall rules among multiple workloads in a hypervisor |
US17/723,191 US12058108B2 (en) | 2019-03-13 | 2022-04-18 | Sharing of firewall rules among multiple workloads in a hypervisor |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/352,577 Continuation US11310202B2 (en) | 2019-03-13 | 2019-03-13 | Sharing of firewall rules among multiple workloads in a hypervisor |
Publications (2)
Publication Number | Publication Date |
---|---|
US20220239635A1 US20220239635A1 (en) | 2022-07-28 |
US12058108B2 true US12058108B2 (en) | 2024-08-06 |
Family
ID=72424332
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/352,577 Active 2040-07-12 US11310202B2 (en) | 2019-03-13 | 2019-03-13 | Sharing of firewall rules among multiple workloads in a hypervisor |
US17/723,191 Active 2039-05-04 US12058108B2 (en) | 2019-03-13 | 2022-04-18 | Sharing of firewall rules among multiple workloads in a hypervisor |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/352,577 Active 2040-07-12 US11310202B2 (en) | 2019-03-13 | 2019-03-13 | Sharing of firewall rules among multiple workloads in a hypervisor |
Country Status (1)
Country | Link |
---|---|
US (2) | US11310202B2 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11310202B2 (en) | 2019-03-13 | 2022-04-19 | Vmware, Inc. | Sharing of firewall rules among multiple workloads in a hypervisor |
US20230370427A1 (en) * | 2022-05-16 | 2023-11-16 | Microsoft Technology Licensing, Llc | Providing a network firewall between a virtualized environment and a host processing system |
Citations (189)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5581722A (en) | 1991-09-30 | 1996-12-03 | Apple Computer, Inc. | Memory management unit for managing address operations corresponding to domains using environmental control |
US5968176A (en) | 1997-05-29 | 1999-10-19 | 3Com Corporation | Multilayer firewall system |
US6098172A (en) | 1997-09-12 | 2000-08-01 | Lucent Technologies Inc. | Methods and apparatus for a computer network firewall with proxy reflection |
US6154775A (en) | 1997-09-12 | 2000-11-28 | Lucent Technologies Inc. | Methods and apparatus for a computer network firewall with dynamic rule processing with the ability to dynamically alter the operations of rules |
US6170012B1 (en) | 1997-09-12 | 2001-01-02 | Lucent Technologies Inc. | Methods and apparatus for a computer network firewall with cache query processing |
US6219786B1 (en) | 1998-09-09 | 2001-04-17 | Surfcontrol, Inc. | Method and system for monitoring and controlling network access |
US20020078370A1 (en) | 2000-12-18 | 2002-06-20 | Tahan Thomas E. | Controlled information flow between communities via a firewall |
WO2002056562A1 (en) | 2001-01-11 | 2002-07-18 | Marconi Uk Intellectual Property Ltd | Firewall with index to access rule |
US6496935B1 (en) | 2000-03-02 | 2002-12-17 | Check Point Software Technologies Ltd | System, device and method for rapid packet filtering and processing |
US20030041266A1 (en) | 2001-03-30 | 2003-02-27 | Yan Ke | Internet security system |
US20030093481A1 (en) | 2001-11-09 | 2003-05-15 | Julian Mitchell | Middlebox control |
US20030120955A1 (en) | 1999-01-29 | 2003-06-26 | Lucent Technologies Inc. | Method and apparatus for managing a firewall |
US20030126468A1 (en) | 2001-05-25 | 2003-07-03 | Markham Thomas R. | Distributed firewall system and method |
JP2003188906A (en) | 2001-12-18 | 2003-07-04 | Mitsubishi Electric Corp | Vpn polycy management device |
US6600744B1 (en) | 1999-03-23 | 2003-07-29 | Alcatel Canada Inc. | Method and apparatus for packet classification in a data communication system |
US20030226027A1 (en) | 2002-05-29 | 2003-12-04 | Bertrand Marquet | High-speed adaptive structure of elementary firewall modules |
US20040049701A1 (en) | 2002-09-05 | 2004-03-11 | Jean-Francois Le Pennec | Firewall system for interconnecting two IP networks managed by two different administrative entities |
US6708187B1 (en) | 1999-06-10 | 2004-03-16 | Alcatel | Method for selective LDAP database synchronization |
US20040177276A1 (en) | 2002-10-10 | 2004-09-09 | Mackinnon Richard | System and method for providing access control |
US20040223495A1 (en) | 2003-05-07 | 2004-11-11 | Jan Pachl | Communication path analysis |
US20040243835A1 (en) | 2003-05-28 | 2004-12-02 | Andreas Terzis | Multilayer access control security system |
US20040255151A1 (en) | 2003-06-04 | 2004-12-16 | International Business Machines Corporation | System and method for enforcing security service level agreements |
US20040268150A1 (en) | 2003-06-30 | 2004-12-30 | Aaron Jeffrey A | Network firewall policy configuration facilitation |
US6880089B1 (en) | 2000-03-31 | 2005-04-12 | Avaya Technology Corp. | Firewall clustering for multiple network servers |
US20050078601A1 (en) | 2003-10-14 | 2005-04-14 | Broadcom Corporation | Hash and route hardware with parallel routing scheme |
US20050190909A1 (en) | 2004-01-30 | 2005-09-01 | Seijiro Yoneyama | Communications apparatus, communications controller, and communications system |
US20050198125A1 (en) | 2004-01-26 | 2005-09-08 | Macleod Beck Christopher C. | Methods and system for creating and managing identity oriented networked communication |
US20050210291A1 (en) | 2004-03-22 | 2005-09-22 | Toui Miyawaki | Storage area network system using internet protocol, security system, security management program and storage device |
US20050262554A1 (en) | 2004-05-18 | 2005-11-24 | International Business Machines | Visualization of firewall rules in an auto provisioning environment |
US20050278431A1 (en) | 2004-06-15 | 2005-12-15 | Sun Microsystems, Inc. | Rule set verification |
US20050276262A1 (en) | 2004-06-15 | 2005-12-15 | Sun Microsystems, Inc. | Rule set conflict resolution |
US20060013136A1 (en) | 2004-06-15 | 2006-01-19 | Sun Microsystems, Inc. | Distributed flow enforcement |
JP2006040274A (en) | 2004-07-09 | 2006-02-09 | Thomson Licensing | Firewall for protecting group of appliance, appliance participating in system and method of updating firewall rule within system |
US7032022B1 (en) | 1999-06-10 | 2006-04-18 | Alcatel | Statistics aggregation for policy-based network |
US7055173B1 (en) | 1997-12-19 | 2006-05-30 | Avaya Technology Corp. | Firewall pooling in a network flowswitch |
US20060129808A1 (en) | 2004-11-19 | 2006-06-15 | Microsoft Corporation | Method and system for distributing security policies |
US20060168213A1 (en) | 1999-12-29 | 2006-07-27 | Richardson John W | System and method for regulating the flow of information to or from an application |
US20060195896A1 (en) | 2004-12-22 | 2006-08-31 | Wake Forest University | Method, systems, and computer program products for implementing function-parallel network firewall |
US7106756B1 (en) | 1999-10-12 | 2006-09-12 | Mci, Inc. | Customer resources policy control for IP traffic delivery |
US20070028291A1 (en) | 2005-07-29 | 2007-02-01 | Bit 9, Inc. | Parametric content control in a network security system |
US20070061492A1 (en) | 2005-08-05 | 2007-03-15 | Red Hat, Inc. | Zero-copy network i/o for virtual hosts |
US20070118893A1 (en) | 2005-11-22 | 2007-05-24 | Fortinet, Inc. | Computerized system and method for policy-based content filtering |
US7227842B1 (en) | 2001-04-24 | 2007-06-05 | Tensilica, Inc. | Fast IP packet classification with configurable processor |
US20070136813A1 (en) | 2005-12-08 | 2007-06-14 | Hsing-Kuo Wong | Method for eliminating invalid intrusion alerts |
US20080072305A1 (en) | 2006-09-14 | 2008-03-20 | Ouova, Inc. | System and method of middlebox detection and characterization |
US7349382B2 (en) | 2002-08-10 | 2008-03-25 | Cisco Technology, Inc. | Reverse path forwarding protection of packets using automated population of access control lists based on a forwarding information base |
US20080082977A1 (en) | 2006-09-29 | 2008-04-03 | Microsoft Corporation | Automatic load and balancing for virtual machines to meet resource requirements |
US20080115190A1 (en) | 2006-11-13 | 2008-05-15 | Jeffrey Aaron | Methods, network services, and computer program products for dynamically assigning users to firewall policy groups |
US20080148382A1 (en) | 2006-12-15 | 2008-06-19 | International Business Machines Corporation | System, method and program for managing firewalls |
WO2008095010A1 (en) | 2007-02-01 | 2008-08-07 | The Board Of Trustees Of The Leland Stanford Jr. University | Secure network switching infrastructure |
US20080215518A1 (en) | 2005-02-24 | 2008-09-04 | Nec Corporation | Filtering Rule Analysis Method and System |
US20080267177A1 (en) | 2007-04-24 | 2008-10-30 | Sun Microsystems, Inc. | Method and system for virtualization of packet encryption offload and onload |
KR20080100620A (en) | 2007-05-14 | 2008-11-19 | (주)이지서티 | Firewall gateway, security policy management method and computer program recording medium |
US20080289026A1 (en) | 2007-05-18 | 2008-11-20 | Microsoft Corporation | Firewall installer |
US20080289028A1 (en) | 2007-05-15 | 2008-11-20 | Bernhard Jansen | Firewall for controlling connections between a client machine and a network |
US20080298274A1 (en) | 2007-05-24 | 2008-12-04 | Souichi Takashige | Method for configuring virtual network and network system |
US20090007219A1 (en) | 2007-06-28 | 2009-01-01 | Microsoft Corporation | Determining a merged security policy for a computer system |
US20090007251A1 (en) | 2007-06-26 | 2009-01-01 | Microsoft Corporation | Host firewall integration with edge traversal technology |
JP2009017269A (en) | 2007-07-05 | 2009-01-22 | Hitachi Ltd | Network controller, network control method, and program |
US20090083727A1 (en) | 2007-09-26 | 2009-03-26 | International Business Machines Corporation | Method and system for securely installing patches for an operating system |
US20090129271A1 (en) | 2007-11-19 | 2009-05-21 | Rajesh Ramankutty | Providing services to packet flows in a network |
US20090150521A1 (en) | 2007-12-10 | 2009-06-11 | Sun Microsystems, Inc. | Method and system for creating a virtual network path |
US20090172800A1 (en) * | 2007-12-26 | 2009-07-02 | Avishai Wool | Reordering a firewall rule base according to usage statistics |
US20090185568A1 (en) | 2008-01-21 | 2009-07-23 | National Taiwan University | Method and system for packet classification with reduced memory space and enhanced access speed |
US20090228972A1 (en) | 2008-03-06 | 2009-09-10 | Sridhar Bandi | Port enablement |
US20090235325A1 (en) | 2006-03-02 | 2009-09-17 | Theo Dimitrakos | Message processing methods and systems |
US20090249438A1 (en) | 2008-03-27 | 2009-10-01 | Moshe Litvin | Moving security for virtual machines |
US20090249436A1 (en) | 2008-04-01 | 2009-10-01 | Microsoft Corporation | Centralized Enforcement of Name-Based Computer System Security Rules |
US20090276771A1 (en) | 2005-09-15 | 2009-11-05 | 3Tera, Inc. | Globally Distributed Utility Computing Cloud |
US20090327198A1 (en) | 2005-10-12 | 2009-12-31 | Jeffrey Farah | System and method for applying rule sets and rule interactions |
US20090327781A1 (en) | 2008-06-30 | 2009-12-31 | Sun Microsystems, Inc. | Method and system for power management in a virtual machine environment without disrupting network connectivity |
US7657887B2 (en) | 2000-05-17 | 2010-02-02 | Interwoven, Inc. | System for transactionally deploying content across multiple machines |
US20100037331A1 (en) | 2006-08-16 | 2010-02-11 | Alan Blake | Recombinant constructs and transgenic fluorescent ornamental fish therefrom |
US20100037311A1 (en) | 2006-11-20 | 2010-02-11 | Liwen He | Secure network architecture |
US20100037310A1 (en) | 2004-03-10 | 2010-02-11 | Eric White | Dynamically adaptive network firewalls and method, system and computer program product implementing same |
US20100043067A1 (en) | 2008-08-14 | 2010-02-18 | Juniper Networks, Inc. | Scalable security services for multicast in a router having integrated zone-based firewall |
US20100100949A1 (en) | 2007-07-06 | 2010-04-22 | Abhilash Vijay Sonwane | Identity and policy-based network security and management system and method |
US20100100616A1 (en) | 2004-09-14 | 2010-04-22 | 3Com Corporation | Method and apparatus for controlling traffic between different entities on a network |
US20100125667A1 (en) | 2008-11-19 | 2010-05-20 | Vmware, Inc. | Dynamic configuration of virtual machines |
US7724740B1 (en) | 2002-08-27 | 2010-05-25 | 3Com Corporation | Computer system and network interface supporting class of service queues |
US20100180331A1 (en) | 2006-03-30 | 2010-07-15 | Nec Corporation | Communication terminal device, rule distribution device, and program |
US20100192215A1 (en) | 2009-01-19 | 2010-07-29 | Tsinghua University | Method for Multi-Core Processor Based Packet Classification on Multiple Fields |
US7818452B2 (en) | 2000-09-13 | 2010-10-19 | Fortinet, Inc. | Distributed virtual system to support managed, network-based services |
US20100333165A1 (en) | 2009-06-24 | 2010-12-30 | Vmware, Inc. | Firewall configured with dynamic membership sets representing machine attributes |
US20110016467A1 (en) | 2009-07-16 | 2011-01-20 | Computer Associates Think. Inc. | System And Method For Managing Virtual Machines |
US20110022695A1 (en) | 2009-07-27 | 2011-01-27 | Vmware, Inc. | Management and Implementation of Enclosed Local Networks in a Virtual Lab |
US7894480B1 (en) | 2002-08-27 | 2011-02-22 | Hewlett-Packard Company | Computer system and network interface with hardware based rule checking for embedded firewall |
US20110055916A1 (en) | 2009-08-28 | 2011-03-03 | Ahn David K | Methods, systems, and computer readable media for adaptive packet filtering |
US20110072486A1 (en) | 2009-09-23 | 2011-03-24 | Computer Associates Think, Inc. | System, Method, and Software for Enforcing Access Control Policy Rules on Utility Computing Virtualization in Cloud Computing Systems |
US20110103259A1 (en) | 2009-11-04 | 2011-05-05 | Gunes Aybay | Methods and apparatus for configuring a virtual network switch |
US20110113467A1 (en) | 2009-11-10 | 2011-05-12 | Sonali Agarwal | System and method for preventing data loss using virtual machine wrapped applications |
US7948986B1 (en) | 2009-02-02 | 2011-05-24 | Juniper Networks, Inc. | Applying services within MPLS networks |
US20110154470A1 (en) | 2009-12-22 | 2011-06-23 | At&T Intellectual Property I, L.P. | Methods, systems, and computer program products for managing firewall change requests in a communication network |
US20110213875A1 (en) | 2010-02-26 | 2011-09-01 | James Michael Ferris | Methods and Systems for Providing Deployment Architectures in Cloud Computing Environments |
US20110246637A1 (en) | 2008-12-18 | 2011-10-06 | Takuya Murakami | Communication device, communication system, communication control method and communication control program |
US8065725B2 (en) | 2003-05-30 | 2011-11-22 | Yuliang Zheng | Systems and methods for enhanced network security |
US20110302647A1 (en) | 2010-06-03 | 2011-12-08 | International Business Machines Corporation | Automating network reconfiguration during migrations |
US20120042033A1 (en) | 2010-08-13 | 2012-02-16 | International Business Machines Corporation | Migrating virtual machines across network separated data centers |
US8190767B1 (en) | 2003-06-24 | 2012-05-29 | Nvidia Corporation | Data structures and state tracking for network protocol processing |
US20120137199A1 (en) | 2010-11-29 | 2012-05-31 | Hui Liu | Cloud Storage Data Access Method, Apparatus and System |
US20120180104A1 (en) | 2010-12-16 | 2012-07-12 | Tufin Software Technologies Ltd. | Method of generating security rule-set and system thereof |
US20120240182A1 (en) | 2011-03-18 | 2012-09-20 | Juniper Networks, Inc. | Security enforcement in virtualized systems |
US20120263049A1 (en) | 2011-04-18 | 2012-10-18 | Cisco Technology, Inc. | Bgp slow peer detection |
US20120291024A1 (en) | 2011-05-13 | 2012-11-15 | International Business Machines Corporation | Virtual Managed Network |
US20120314617A1 (en) | 2011-06-09 | 2012-12-13 | Time Warner Cable Inc. | Techniques for prefix subnetting |
US20130007740A1 (en) | 2011-06-29 | 2013-01-03 | Fujitsu Limited | Apparatus and method for monitoring communication performed by a virtual machine |
US20130019277A1 (en) | 2011-07-12 | 2013-01-17 | Cisco Technology, Inc. | Zone-Based Firewall Policy Model for a Virtualized Data Center |
US8365294B2 (en) | 2006-06-30 | 2013-01-29 | Intel Corporation | Hardware platform authentication and multi-platform validation |
US20130031544A1 (en) | 2011-07-27 | 2013-01-31 | Microsoft Corporation | Virtual machine migration to minimize packet loss in virtualized network |
US20130047151A1 (en) | 2011-08-16 | 2013-02-21 | Microsoft Corporation | Virtualization gateway between virtualized and non-virtualized networks |
US20130073743A1 (en) | 2011-09-19 | 2013-03-21 | Cisco Technology, Inc. | Services controlled session based flow interceptor |
US20130074066A1 (en) | 2011-09-21 | 2013-03-21 | Cisco Technology, Inc. | Portable Port Profiles for Virtual Machines in a Virtualized Data Center |
US20130125230A1 (en) | 2011-11-15 | 2013-05-16 | Nicira, Inc. | Firewalls in logical networks |
US20130163594A1 (en) | 2011-12-21 | 2013-06-27 | Cisco Technology, Inc. | Overlay-Based Packet Steering |
US20130198355A1 (en) | 2012-01-31 | 2013-08-01 | International Business Machines Corporation | Interconnecting data centers for migration of virtual machines |
US20130219384A1 (en) | 2012-02-18 | 2013-08-22 | Cisco Technology, Inc. | System and method for verifying layer 2 connectivity in a virtual environment |
US20130227550A1 (en) | 2012-02-27 | 2013-08-29 | Computer Associates Think, Inc. | System and method for isolated virtual image and appliance communication within a cloud environment |
US20130227097A1 (en) | 2010-09-14 | 2013-08-29 | Hitachi, Ltd. | Multi-tenancy information processing system, management server, and configuration management method |
US8578500B2 (en) | 2005-05-31 | 2013-11-05 | Kurt James Long | System and method of fraud and misuse detection |
US20130311612A1 (en) | 2012-05-16 | 2013-11-21 | Rackspace Us, Inc. | Indirection Objects in a Cloud Storage System |
US20130311358A1 (en) | 2012-05-18 | 2013-11-21 | Jpmorgan Chase Bank, N.A. | Dynamic management and netting of transactions using executable rules |
US20130332983A1 (en) | 2012-06-12 | 2013-12-12 | TELEFONAKTIEBOLAGET L M ERRICSSON (publ) | Elastic Enforcement Layer for Cloud Security Using SDN |
US8621552B1 (en) | 2007-05-22 | 2013-12-31 | Skybox Security Inc. | Method, a system, and a computer program product for managing access change assurance |
US8660129B1 (en) | 2012-02-02 | 2014-02-25 | Cisco Technology, Inc. | Fully distributed routing over a user-configured on-demand virtual network for infrastructure-as-a-service (IaaS) on hybrid cloud networks |
US20140068602A1 (en) | 2012-09-04 | 2014-03-06 | Aaron Robert Gember | Cloud-Based Middlebox Management System |
US20140108319A1 (en) | 2012-10-12 | 2014-04-17 | Bruno KLAUSER | Autonomic network sentinels |
US20140115578A1 (en) | 2012-10-21 | 2014-04-24 | Geoffrey Howard Cooper | Providing a virtual security appliance architecture to a virtual cloud infrastructure |
US20140149794A1 (en) | 2011-12-07 | 2014-05-29 | Sachin Shetty | System and method of implementing an object storage infrastructure for cloud-based services |
US20140195666A1 (en) | 2011-08-04 | 2014-07-10 | Midokura Sarl | System and method for implementing and managing virtual networks |
US8806605B1 (en) | 2008-01-11 | 2014-08-12 | Juniper Networks, Inc. | Provisioning network access through a firewall |
US20140245423A1 (en) | 2013-02-26 | 2014-08-28 | Zentera Systems, Inc. | Peripheral Firewall System for Application Protection in Cloud Computing Environments |
US20140281030A1 (en) | 2013-03-15 | 2014-09-18 | Vmware, Inc. | Virtual Network Flow Monitoring |
US20140282889A1 (en) | 2013-03-14 | 2014-09-18 | Rackspace Us, Inc. | Method and System for Identity-Based Authentication of Virtual Machines |
US20140282855A1 (en) | 2013-03-13 | 2014-09-18 | FireMon, LLC | Modeling network devices for behavior analysis |
US20140297780A1 (en) | 2013-03-26 | 2014-10-02 | Vmware, Inc. | Method and system for vm-granular ssd/flash cache live migration |
US20140304387A1 (en) | 2012-06-19 | 2014-10-09 | Microsoft Corporation | Multi-tenant middleware cloud service technology |
US20140325037A1 (en) | 2013-04-29 | 2014-10-30 | Amazon Technologies, Inc. | Automated Creation of Private Virtual Networks in a Service Provider Network |
US8904511B1 (en) | 2010-08-23 | 2014-12-02 | Amazon Technologies, Inc. | Virtual firewalls for multi-tenant distributed services |
US20150052521A1 (en) | 2013-08-13 | 2015-02-19 | Vmware, Inc. | Method and system for migration of virtual machines and virtual applications between cloud-computing facilities and subsequently permanently relocating migrated virtual machines and virtual applications |
US20150095970A1 (en) | 2013-10-01 | 2015-04-02 | Codeproof Technologies, Inc. | Mobile device management as a simplified online software service |
US20150112933A1 (en) | 2013-10-18 | 2015-04-23 | Cisco Technology, Inc. | System and method for software defined network aware data replication |
US9021546B1 (en) * | 2011-11-08 | 2015-04-28 | Symantec Corporation | Systems and methods for workload security in virtual data centers |
US9047109B1 (en) | 2012-06-20 | 2015-06-02 | Palo Alto Networks, Inc. | Policy enforcement in virtualized environment |
US20150193466A1 (en) | 2014-01-06 | 2015-07-09 | Siegfried Luft | Architecture and method for cloud provider selection and projection |
US20150200816A1 (en) | 2014-01-10 | 2015-07-16 | Facebook, Inc. | Policy performance ordering |
US20150229641A1 (en) | 2012-04-23 | 2015-08-13 | Hangzhou H3C Technologies Co., Ltd. | Migration of a security policy of a virtual machine |
US20150237014A1 (en) | 2014-02-20 | 2015-08-20 | Nicira, Inc. | Method and apparatus for distributing firewall rules |
US20150277949A1 (en) | 2014-03-27 | 2015-10-01 | Thiam Wah Loh | Securing shared interconnect for virtual machine |
US9215210B2 (en) | 2014-03-31 | 2015-12-15 | Nicira, Inc. | Migrating firewall connection state for a firewall service virtual machine |
US20160050117A1 (en) | 2013-03-19 | 2016-02-18 | Yale University | Managing network forwarding configurations using algorithmic policies |
US20160050141A1 (en) | 2013-04-28 | 2016-02-18 | Huawei Technologies Co., Ltd. | Traffic Classifier, Service Routing Trigger, and Packet Processing Method and System |
US20160065627A1 (en) | 2014-08-29 | 2016-03-03 | Box, Inc. | Configurable metadata-based automation and content classification architecture for cloud-based collaboration platforms |
US20160094456A1 (en) | 2014-09-30 | 2016-03-31 | Nicira, Inc. | Method and apparatus for distributing load among a plurality of service nodes |
US20160094643A1 (en) | 2014-09-30 | 2016-03-31 | Nicira, Inc. | Dynamically adjusting load balancing |
US20160105333A1 (en) | 2014-10-10 | 2016-04-14 | Nicira, Inc. | Logical network traffic analysis |
US20160112374A1 (en) | 2015-12-30 | 2016-04-21 | Iomaxis, Inc | Method and system for securing and protecting smart devices within the internet of things ecosystem |
US20160149863A1 (en) | 2013-06-25 | 2016-05-26 | Ditno. Pty Ltd | Method and system for managing a host-based firewall |
US20160156591A1 (en) | 2014-12-02 | 2016-06-02 | Nicira, Inc. | Context-aware distributed firewall |
US9367257B2 (en) | 2008-09-11 | 2016-06-14 | Microsoft Technology Licensing, Llc | Techniques for resource location and migration across data centers |
US9369431B1 (en) | 2013-02-07 | 2016-06-14 | Infoblox Inc. | Security device controller |
US20160182454A1 (en) | 2014-12-22 | 2016-06-23 | Edgecast Networks, Inc. | Real-Time Reconfigurable Web Application Firewall For a Distributed Platform |
US20160191466A1 (en) | 2014-12-30 | 2016-06-30 | Fortinet, Inc. | Dynamically optimized security policy management |
US20160241702A1 (en) | 2014-05-29 | 2016-08-18 | Fortinet, Inc. | Management of wireless access points via virtualization |
US9479464B1 (en) | 2002-08-27 | 2016-10-25 | Hewlett Packard Enterprise Development Lp | Computer system and network interface with hardware based packet filtering and classification |
US20170004192A1 (en) | 2015-06-30 | 2017-01-05 | Nicira, Inc. | Replicating firewall policy across multiple data centers |
US9553806B2 (en) | 2015-02-06 | 2017-01-24 | Telefonaktiebolaget L M Ericsson (Publ) | Method and system for supporting port ranging in a software-defined networking (SDN) system |
US20170026283A1 (en) | 2015-07-24 | 2017-01-26 | International Business Machines Corporation | Adding multi-tenant awareness to a network packet processing device on a Software Defined Network (SDN) |
US20170064749A1 (en) | 2015-08-28 | 2017-03-02 | Nicira, Inc. | Associating Service Tags with Remote Data Message Flows Based on Remote Device Management Attributes |
US9614748B1 (en) | 2008-04-15 | 2017-04-04 | Vmware, Inc. | Multitenant data center providing virtual computing services |
US20170118173A1 (en) | 2015-10-23 | 2017-04-27 | Attala Systems, LLC | Distributed firewalls and virtual network services using network packets with security tags |
US20170134422A1 (en) | 2014-02-11 | 2017-05-11 | Varmour Networks, Inc. | Deception Techniques Using Policy |
US20170171362A1 (en) | 2015-12-15 | 2017-06-15 | Intel Corporation | High speed flexible packet classification using network processors |
US20170180321A1 (en) | 2015-12-18 | 2017-06-22 | Nicira, Inc. | Datapath processing of service rules with qualifiers defined in terms of dynamic groups |
US20170180319A1 (en) | 2015-12-18 | 2017-06-22 | Nicira, Inc. | Datapath processing of service rules with qualifiers defined in terms of template identifiers and/or template matching criteria |
US20170180423A1 (en) | 2015-12-18 | 2017-06-22 | Nicira, Inc. | Service rule console for creating, viewing and updating template based service rules |
US20170180320A1 (en) | 2015-12-18 | 2017-06-22 | Nicira, Inc. | Creating and distributing template based service rules |
US20170250869A1 (en) | 2014-09-12 | 2017-08-31 | Andreas Richard Voellmy | Managing network forwarding configurations using algorithmic policies |
US9774707B2 (en) | 2014-06-04 | 2017-09-26 | Nicira, Inc. | Efficient packet classification for dynamic containers |
US20170317979A1 (en) | 2016-05-01 | 2017-11-02 | Nicira, Inc. | Publication of Firewall Configuration |
US20170317977A1 (en) | 2016-05-01 | 2017-11-02 | Nicira, Inc. | Fast ordering of firewall sections and rules |
US20170317928A1 (en) | 2016-04-29 | 2017-11-02 | Nicira, Inc. | Address Grouping for Distributed Service Rules |
US20170317976A1 (en) | 2016-04-29 | 2017-11-02 | Nicira, Inc. | Priority Allocation for Distributed Service Rules |
US20180007008A1 (en) | 2016-06-29 | 2018-01-04 | Nicira, Inc. | Firewall Configuration Versioning |
US20180007007A1 (en) | 2016-06-29 | 2018-01-04 | Nicira, Inc. | Self-service firewall configuration |
US20190182213A1 (en) * | 2017-12-13 | 2019-06-13 | Teloip Inc. | System, apparatus and method for providing a unified firewall manager |
US10484334B1 (en) | 2013-02-26 | 2019-11-19 | Zentera Systems, Inc. | Distributed firewall security system that extends across different cloud computing networks |
US10701104B2 (en) * | 2015-08-18 | 2020-06-30 | Acronis International Gmbh | Agentless security of virtual machines using a network interface controller |
US20200296078A1 (en) | 2019-03-13 | 2020-09-17 | Vmware, Inc. | Sharing of firewall rules among multiple workloads in a hypervisor |
US10873595B1 (en) | 2003-07-01 | 2020-12-22 | Securityprofiling, Llc | Real-time vulnerability monitoring |
-
2019
- 2019-03-13 US US16/352,577 patent/US11310202B2/en active Active
-
2022
- 2022-04-18 US US17/723,191 patent/US12058108B2/en active Active
Patent Citations (246)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5581722A (en) | 1991-09-30 | 1996-12-03 | Apple Computer, Inc. | Memory management unit for managing address operations corresponding to domains using environmental control |
US5968176A (en) | 1997-05-29 | 1999-10-19 | 3Com Corporation | Multilayer firewall system |
US6098172A (en) | 1997-09-12 | 2000-08-01 | Lucent Technologies Inc. | Methods and apparatus for a computer network firewall with proxy reflection |
US6154775A (en) | 1997-09-12 | 2000-11-28 | Lucent Technologies Inc. | Methods and apparatus for a computer network firewall with dynamic rule processing with the ability to dynamically alter the operations of rules |
US6170012B1 (en) | 1997-09-12 | 2001-01-02 | Lucent Technologies Inc. | Methods and apparatus for a computer network firewall with cache query processing |
US7055173B1 (en) | 1997-12-19 | 2006-05-30 | Avaya Technology Corp. | Firewall pooling in a network flowswitch |
US6219786B1 (en) | 1998-09-09 | 2001-04-17 | Surfcontrol, Inc. | Method and system for monitoring and controlling network access |
US20030120955A1 (en) | 1999-01-29 | 2003-06-26 | Lucent Technologies Inc. | Method and apparatus for managing a firewall |
US6600744B1 (en) | 1999-03-23 | 2003-07-29 | Alcatel Canada Inc. | Method and apparatus for packet classification in a data communication system |
US7032022B1 (en) | 1999-06-10 | 2006-04-18 | Alcatel | Statistics aggregation for policy-based network |
US6708187B1 (en) | 1999-06-10 | 2004-03-16 | Alcatel | Method for selective LDAP database synchronization |
US7106756B1 (en) | 1999-10-12 | 2006-09-12 | Mci, Inc. | Customer resources policy control for IP traffic delivery |
US20060168213A1 (en) | 1999-12-29 | 2006-07-27 | Richardson John W | System and method for regulating the flow of information to or from an application |
US6496935B1 (en) | 2000-03-02 | 2002-12-17 | Check Point Software Technologies Ltd | System, device and method for rapid packet filtering and processing |
US6880089B1 (en) | 2000-03-31 | 2005-04-12 | Avaya Technology Corp. | Firewall clustering for multiple network servers |
US7657887B2 (en) | 2000-05-17 | 2010-02-02 | Interwoven, Inc. | System for transactionally deploying content across multiple machines |
US7818452B2 (en) | 2000-09-13 | 2010-10-19 | Fortinet, Inc. | Distributed virtual system to support managed, network-based services |
US20020078370A1 (en) | 2000-12-18 | 2002-06-20 | Tahan Thomas E. | Controlled information flow between communities via a firewall |
WO2002056562A1 (en) | 2001-01-11 | 2002-07-18 | Marconi Uk Intellectual Property Ltd | Firewall with index to access rule |
US20030041266A1 (en) | 2001-03-30 | 2003-02-27 | Yan Ke | Internet security system |
US7227842B1 (en) | 2001-04-24 | 2007-06-05 | Tensilica, Inc. | Fast IP packet classification with configurable processor |
US20030126468A1 (en) | 2001-05-25 | 2003-07-03 | Markham Thomas R. | Distributed firewall system and method |
US20030093481A1 (en) | 2001-11-09 | 2003-05-15 | Julian Mitchell | Middlebox control |
JP2003188906A (en) | 2001-12-18 | 2003-07-04 | Mitsubishi Electric Corp | Vpn polycy management device |
US20030226027A1 (en) | 2002-05-29 | 2003-12-04 | Bertrand Marquet | High-speed adaptive structure of elementary firewall modules |
US7349382B2 (en) | 2002-08-10 | 2008-03-25 | Cisco Technology, Inc. | Reverse path forwarding protection of packets using automated population of access control lists based on a forwarding information base |
US7724740B1 (en) | 2002-08-27 | 2010-05-25 | 3Com Corporation | Computer system and network interface supporting class of service queues |
US9479464B1 (en) | 2002-08-27 | 2016-10-25 | Hewlett Packard Enterprise Development Lp | Computer system and network interface with hardware based packet filtering and classification |
US7894480B1 (en) | 2002-08-27 | 2011-02-22 | Hewlett-Packard Company | Computer system and network interface with hardware based rule checking for embedded firewall |
US20040049701A1 (en) | 2002-09-05 | 2004-03-11 | Jean-Francois Le Pennec | Firewall system for interconnecting two IP networks managed by two different administrative entities |
US20040177276A1 (en) | 2002-10-10 | 2004-09-09 | Mackinnon Richard | System and method for providing access control |
US20040223495A1 (en) | 2003-05-07 | 2004-11-11 | Jan Pachl | Communication path analysis |
US20040243835A1 (en) | 2003-05-28 | 2004-12-02 | Andreas Terzis | Multilayer access control security system |
US8065725B2 (en) | 2003-05-30 | 2011-11-22 | Yuliang Zheng | Systems and methods for enhanced network security |
US20040255151A1 (en) | 2003-06-04 | 2004-12-16 | International Business Machines Corporation | System and method for enforcing security service level agreements |
US8190767B1 (en) | 2003-06-24 | 2012-05-29 | Nvidia Corporation | Data structures and state tracking for network protocol processing |
US20040268150A1 (en) | 2003-06-30 | 2004-12-30 | Aaron Jeffrey A | Network firewall policy configuration facilitation |
US10873595B1 (en) | 2003-07-01 | 2020-12-22 | Securityprofiling, Llc | Real-time vulnerability monitoring |
US20050078601A1 (en) | 2003-10-14 | 2005-04-14 | Broadcom Corporation | Hash and route hardware with parallel routing scheme |
US20050198125A1 (en) | 2004-01-26 | 2005-09-08 | Macleod Beck Christopher C. | Methods and system for creating and managing identity oriented networked communication |
US20050190909A1 (en) | 2004-01-30 | 2005-09-01 | Seijiro Yoneyama | Communications apparatus, communications controller, and communications system |
US20100037310A1 (en) | 2004-03-10 | 2010-02-11 | Eric White | Dynamically adaptive network firewalls and method, system and computer program product implementing same |
US8032933B2 (en) | 2004-03-10 | 2011-10-04 | Rocksteady Technologies, Llc | Dynamically adaptive network firewalls and method, system and computer program product implementing same |
US20050210291A1 (en) | 2004-03-22 | 2005-09-22 | Toui Miyawaki | Storage area network system using internet protocol, security system, security management program and storage device |
US20050262554A1 (en) | 2004-05-18 | 2005-11-24 | International Business Machines | Visualization of firewall rules in an auto provisioning environment |
US20050276262A1 (en) | 2004-06-15 | 2005-12-15 | Sun Microsystems, Inc. | Rule set conflict resolution |
US20050278431A1 (en) | 2004-06-15 | 2005-12-15 | Sun Microsystems, Inc. | Rule set verification |
US20060013136A1 (en) | 2004-06-15 | 2006-01-19 | Sun Microsystems, Inc. | Distributed flow enforcement |
JP2006040274A (en) | 2004-07-09 | 2006-02-09 | Thomson Licensing | Firewall for protecting group of appliance, appliance participating in system and method of updating firewall rule within system |
US7676836B2 (en) | 2004-07-09 | 2010-03-09 | Thomson Licensing | Firewall system protecting a community of appliances, appliance participating in the system and method of updating the firewall rules within the system |
US20100100616A1 (en) | 2004-09-14 | 2010-04-22 | 3Com Corporation | Method and apparatus for controlling traffic between different entities on a network |
US7831826B2 (en) | 2004-11-19 | 2010-11-09 | Microsoft Corporation | Method and system for distributing security policies |
US20060129808A1 (en) | 2004-11-19 | 2006-06-15 | Microsoft Corporation | Method and system for distributing security policies |
US20060195896A1 (en) | 2004-12-22 | 2006-08-31 | Wake Forest University | Method, systems, and computer program products for implementing function-parallel network firewall |
US20080215518A1 (en) | 2005-02-24 | 2008-09-04 | Nec Corporation | Filtering Rule Analysis Method and System |
US8578500B2 (en) | 2005-05-31 | 2013-11-05 | Kurt James Long | System and method of fraud and misuse detection |
US20070028291A1 (en) | 2005-07-29 | 2007-02-01 | Bit 9, Inc. | Parametric content control in a network security system |
US20070061492A1 (en) | 2005-08-05 | 2007-03-15 | Red Hat, Inc. | Zero-copy network i/o for virtual hosts |
US20090276771A1 (en) | 2005-09-15 | 2009-11-05 | 3Tera, Inc. | Globally Distributed Utility Computing Cloud |
US20090327198A1 (en) | 2005-10-12 | 2009-12-31 | Jeffrey Farah | System and method for applying rule sets and rule interactions |
US20070118893A1 (en) | 2005-11-22 | 2007-05-24 | Fortinet, Inc. | Computerized system and method for policy-based content filtering |
US20070136813A1 (en) | 2005-12-08 | 2007-06-14 | Hsing-Kuo Wong | Method for eliminating invalid intrusion alerts |
US20090235325A1 (en) | 2006-03-02 | 2009-09-17 | Theo Dimitrakos | Message processing methods and systems |
US20100180331A1 (en) | 2006-03-30 | 2010-07-15 | Nec Corporation | Communication terminal device, rule distribution device, and program |
US8365294B2 (en) | 2006-06-30 | 2013-01-29 | Intel Corporation | Hardware platform authentication and multi-platform validation |
US20100037331A1 (en) | 2006-08-16 | 2010-02-11 | Alan Blake | Recombinant constructs and transgenic fluorescent ornamental fish therefrom |
US20080072305A1 (en) | 2006-09-14 | 2008-03-20 | Ouova, Inc. | System and method of middlebox detection and characterization |
US20080082977A1 (en) | 2006-09-29 | 2008-04-03 | Microsoft Corporation | Automatic load and balancing for virtual machines to meet resource requirements |
US7954143B2 (en) | 2006-11-13 | 2011-05-31 | At&T Intellectual Property I, Lp | Methods, network services, and computer program products for dynamically assigning users to firewall policy groups |
US20080115190A1 (en) | 2006-11-13 | 2008-05-15 | Jeffrey Aaron | Methods, network services, and computer program products for dynamically assigning users to firewall policy groups |
US20100037311A1 (en) | 2006-11-20 | 2010-02-11 | Liwen He | Secure network architecture |
US20080148382A1 (en) | 2006-12-15 | 2008-06-19 | International Business Machines Corporation | System, method and program for managing firewalls |
US20080189769A1 (en) | 2007-02-01 | 2008-08-07 | Martin Casado | Secure network switching infrastructure |
WO2008095010A1 (en) | 2007-02-01 | 2008-08-07 | The Board Of Trustees Of The Leland Stanford Jr. University | Secure network switching infrastructure |
US20080267177A1 (en) | 2007-04-24 | 2008-10-30 | Sun Microsystems, Inc. | Method and system for virtualization of packet encryption offload and onload |
KR20080100620A (en) | 2007-05-14 | 2008-11-19 | (주)이지서티 | Firewall gateway, security policy management method and computer program recording medium |
US20080289028A1 (en) | 2007-05-15 | 2008-11-20 | Bernhard Jansen | Firewall for controlling connections between a client machine and a network |
US20080289026A1 (en) | 2007-05-18 | 2008-11-20 | Microsoft Corporation | Firewall installer |
US8621552B1 (en) | 2007-05-22 | 2013-12-31 | Skybox Security Inc. | Method, a system, and a computer program product for managing access change assurance |
US20080298274A1 (en) | 2007-05-24 | 2008-12-04 | Souichi Takashige | Method for configuring virtual network and network system |
US20090007251A1 (en) | 2007-06-26 | 2009-01-01 | Microsoft Corporation | Host firewall integration with edge traversal technology |
US20090007219A1 (en) | 2007-06-28 | 2009-01-01 | Microsoft Corporation | Determining a merged security policy for a computer system |
JP2009017269A (en) | 2007-07-05 | 2009-01-22 | Hitachi Ltd | Network controller, network control method, and program |
US20100100949A1 (en) | 2007-07-06 | 2010-04-22 | Abhilash Vijay Sonwane | Identity and policy-based network security and management system and method |
US20090083727A1 (en) | 2007-09-26 | 2009-03-26 | International Business Machines Corporation | Method and system for securely installing patches for an operating system |
US20090129271A1 (en) | 2007-11-19 | 2009-05-21 | Rajesh Ramankutty | Providing services to packet flows in a network |
US20090150521A1 (en) | 2007-12-10 | 2009-06-11 | Sun Microsystems, Inc. | Method and system for creating a virtual network path |
US20090172800A1 (en) * | 2007-12-26 | 2009-07-02 | Avishai Wool | Reordering a firewall rule base according to usage statistics |
US8806605B1 (en) | 2008-01-11 | 2014-08-12 | Juniper Networks, Inc. | Provisioning network access through a firewall |
US20090185568A1 (en) | 2008-01-21 | 2009-07-23 | National Taiwan University | Method and system for packet classification with reduced memory space and enhanced access speed |
US20090228972A1 (en) | 2008-03-06 | 2009-09-10 | Sridhar Bandi | Port enablement |
US20090249470A1 (en) | 2008-03-27 | 2009-10-01 | Moshe Litvin | Combined firewalls |
US20090249438A1 (en) | 2008-03-27 | 2009-10-01 | Moshe Litvin | Moving security for virtual machines |
US20090249472A1 (en) | 2008-03-27 | 2009-10-01 | Moshe Litvin | Hierarchical firewalls |
US20090249436A1 (en) | 2008-04-01 | 2009-10-01 | Microsoft Corporation | Centralized Enforcement of Name-Based Computer System Security Rules |
US9614748B1 (en) | 2008-04-15 | 2017-04-04 | Vmware, Inc. | Multitenant data center providing virtual computing services |
US20090327781A1 (en) | 2008-06-30 | 2009-12-31 | Sun Microsystems, Inc. | Method and system for power management in a virtual machine environment without disrupting network connectivity |
US20100043067A1 (en) | 2008-08-14 | 2010-02-18 | Juniper Networks, Inc. | Scalable security services for multicast in a router having integrated zone-based firewall |
US9367257B2 (en) | 2008-09-11 | 2016-06-14 | Microsoft Technology Licensing, Llc | Techniques for resource location and migration across data centers |
US20100125667A1 (en) | 2008-11-19 | 2010-05-20 | Vmware, Inc. | Dynamic configuration of virtual machines |
US20110246637A1 (en) | 2008-12-18 | 2011-10-06 | Takuya Murakami | Communication device, communication system, communication control method and communication control program |
US20100192215A1 (en) | 2009-01-19 | 2010-07-29 | Tsinghua University | Method for Multi-Core Processor Based Packet Classification on Multiple Fields |
US7948986B1 (en) | 2009-02-02 | 2011-05-24 | Juniper Networks, Inc. | Applying services within MPLS networks |
US9621516B2 (en) | 2009-06-24 | 2017-04-11 | Vmware, Inc. | Firewall configured with dynamic membership sets representing machine attributes |
US20100333165A1 (en) | 2009-06-24 | 2010-12-30 | Vmware, Inc. | Firewall configured with dynamic membership sets representing machine attributes |
US20170187679A1 (en) | 2009-06-24 | 2017-06-29 | Vmware, Inc. | Firewall configured with dynamic membership sets representing machine attributes |
US20110016467A1 (en) | 2009-07-16 | 2011-01-20 | Computer Associates Think. Inc. | System And Method For Managing Virtual Machines |
US20110022695A1 (en) | 2009-07-27 | 2011-01-27 | Vmware, Inc. | Management and Implementation of Enclosed Local Networks in a Virtual Lab |
US20110055916A1 (en) | 2009-08-28 | 2011-03-03 | Ahn David K | Methods, systems, and computer readable media for adaptive packet filtering |
US20110072486A1 (en) | 2009-09-23 | 2011-03-24 | Computer Associates Think, Inc. | System, Method, and Software for Enforcing Access Control Policy Rules on Utility Computing Virtualization in Cloud Computing Systems |
US20110103259A1 (en) | 2009-11-04 | 2011-05-05 | Gunes Aybay | Methods and apparatus for configuring a virtual network switch |
US20110113467A1 (en) | 2009-11-10 | 2011-05-12 | Sonali Agarwal | System and method for preventing data loss using virtual machine wrapped applications |
US20170134436A1 (en) | 2009-11-10 | 2017-05-11 | Mcafee, Inc. | System and method for preventing data loss using virtual machine wrapped applications |
US9154462B2 (en) | 2009-12-22 | 2015-10-06 | At&T Intellectual Property I, L.P. | Methods, systems, and computer program products for managing firewall change requests in a communication network |
US20110154470A1 (en) | 2009-12-22 | 2011-06-23 | At&T Intellectual Property I, L.P. | Methods, systems, and computer program products for managing firewall change requests in a communication network |
US20110213875A1 (en) | 2010-02-26 | 2011-09-01 | James Michael Ferris | Methods and Systems for Providing Deployment Architectures in Cloud Computing Environments |
US20110302647A1 (en) | 2010-06-03 | 2011-12-08 | International Business Machines Corporation | Automating network reconfiguration during migrations |
US8813209B2 (en) | 2010-06-03 | 2014-08-19 | International Business Machines Corporation | Automating network reconfiguration during migrations |
US20120042033A1 (en) | 2010-08-13 | 2012-02-16 | International Business Machines Corporation | Migrating virtual machines across network separated data centers |
US8904511B1 (en) | 2010-08-23 | 2014-12-02 | Amazon Technologies, Inc. | Virtual firewalls for multi-tenant distributed services |
US20130227097A1 (en) | 2010-09-14 | 2013-08-29 | Hitachi, Ltd. | Multi-tenancy information processing system, management server, and configuration management method |
US20120137199A1 (en) | 2010-11-29 | 2012-05-31 | Hui Liu | Cloud Storage Data Access Method, Apparatus and System |
US20120180104A1 (en) | 2010-12-16 | 2012-07-12 | Tufin Software Technologies Ltd. | Method of generating security rule-set and system thereof |
US20120240182A1 (en) | 2011-03-18 | 2012-09-20 | Juniper Networks, Inc. | Security enforcement in virtualized systems |
US20120263049A1 (en) | 2011-04-18 | 2012-10-18 | Cisco Technology, Inc. | Bgp slow peer detection |
US20120291024A1 (en) | 2011-05-13 | 2012-11-15 | International Business Machines Corporation | Virtual Managed Network |
US20120314617A1 (en) | 2011-06-09 | 2012-12-13 | Time Warner Cable Inc. | Techniques for prefix subnetting |
JP2013012865A (en) | 2011-06-29 | 2013-01-17 | Fujitsu Ltd | Information processor, information processing program, and management method |
US20130007740A1 (en) | 2011-06-29 | 2013-01-03 | Fujitsu Limited | Apparatus and method for monitoring communication performed by a virtual machine |
US20130019277A1 (en) | 2011-07-12 | 2013-01-17 | Cisco Technology, Inc. | Zone-Based Firewall Policy Model for a Virtualized Data Center |
US20150163200A1 (en) | 2011-07-12 | 2015-06-11 | Cisco Technology, Inc. | Zone-Based Firewall Policy Model for a Virtualized Data Center |
US20130031544A1 (en) | 2011-07-27 | 2013-01-31 | Microsoft Corporation | Virtual machine migration to minimize packet loss in virtualized network |
US20140195666A1 (en) | 2011-08-04 | 2014-07-10 | Midokura Sarl | System and method for implementing and managing virtual networks |
US20130047151A1 (en) | 2011-08-16 | 2013-02-21 | Microsoft Corporation | Virtualization gateway between virtualized and non-virtualized networks |
US20130073743A1 (en) | 2011-09-19 | 2013-03-21 | Cisco Technology, Inc. | Services controlled session based flow interceptor |
US20130074066A1 (en) | 2011-09-21 | 2013-03-21 | Cisco Technology, Inc. | Portable Port Profiles for Virtual Machines in a Virtualized Data Center |
US9021546B1 (en) * | 2011-11-08 | 2015-04-28 | Symantec Corporation | Systems and methods for workload security in virtual data centers |
WO2013074828A1 (en) | 2011-11-15 | 2013-05-23 | Nicira, Inc. | Firewalls in logical networks |
US20130125230A1 (en) | 2011-11-15 | 2013-05-16 | Nicira, Inc. | Firewalls in logical networks |
EP2748750A1 (en) | 2011-11-15 | 2014-07-02 | Nicira Inc. | Firewalls in logical networks |
US9015823B2 (en) | 2011-11-15 | 2015-04-21 | Nicira, Inc. | Firewalls in logical networks |
US20140149794A1 (en) | 2011-12-07 | 2014-05-29 | Sachin Shetty | System and method of implementing an object storage infrastructure for cloud-based services |
US20130163594A1 (en) | 2011-12-21 | 2013-06-27 | Cisco Technology, Inc. | Overlay-Based Packet Steering |
US20130198355A1 (en) | 2012-01-31 | 2013-08-01 | International Business Machines Corporation | Interconnecting data centers for migration of virtual machines |
US8660129B1 (en) | 2012-02-02 | 2014-02-25 | Cisco Technology, Inc. | Fully distributed routing over a user-configured on-demand virtual network for infrastructure-as-a-service (IaaS) on hybrid cloud networks |
US20130219384A1 (en) | 2012-02-18 | 2013-08-22 | Cisco Technology, Inc. | System and method for verifying layer 2 connectivity in a virtual environment |
US20130227550A1 (en) | 2012-02-27 | 2013-08-29 | Computer Associates Think, Inc. | System and method for isolated virtual image and appliance communication within a cloud environment |
US20150229641A1 (en) | 2012-04-23 | 2015-08-13 | Hangzhou H3C Technologies Co., Ltd. | Migration of a security policy of a virtual machine |
US20130311612A1 (en) | 2012-05-16 | 2013-11-21 | Rackspace Us, Inc. | Indirection Objects in a Cloud Storage System |
US20130311358A1 (en) | 2012-05-18 | 2013-11-21 | Jpmorgan Chase Bank, N.A. | Dynamic management and netting of transactions using executable rules |
US20130332983A1 (en) | 2012-06-12 | 2013-12-12 | TELEFONAKTIEBOLAGET L M ERRICSSON (publ) | Elastic Enforcement Layer for Cloud Security Using SDN |
US20140304387A1 (en) | 2012-06-19 | 2014-10-09 | Microsoft Corporation | Multi-tenant middleware cloud service technology |
US9047109B1 (en) | 2012-06-20 | 2015-06-02 | Palo Alto Networks, Inc. | Policy enforcement in virtualized environment |
US20140068602A1 (en) | 2012-09-04 | 2014-03-06 | Aaron Robert Gember | Cloud-Based Middlebox Management System |
US20140108319A1 (en) | 2012-10-12 | 2014-04-17 | Bruno KLAUSER | Autonomic network sentinels |
US20140115578A1 (en) | 2012-10-21 | 2014-04-24 | Geoffrey Howard Cooper | Providing a virtual security appliance architecture to a virtual cloud infrastructure |
US9369431B1 (en) | 2013-02-07 | 2016-06-14 | Infoblox Inc. | Security device controller |
US20140245423A1 (en) | 2013-02-26 | 2014-08-28 | Zentera Systems, Inc. | Peripheral Firewall System for Application Protection in Cloud Computing Environments |
US10484334B1 (en) | 2013-02-26 | 2019-11-19 | Zentera Systems, Inc. | Distributed firewall security system that extends across different cloud computing networks |
US9130901B2 (en) | 2013-02-26 | 2015-09-08 | Zentera Systems, Inc. | Peripheral firewall system for application protection in cloud computing environments |
US20140282855A1 (en) | 2013-03-13 | 2014-09-18 | FireMon, LLC | Modeling network devices for behavior analysis |
US20140282889A1 (en) | 2013-03-14 | 2014-09-18 | Rackspace Us, Inc. | Method and System for Identity-Based Authentication of Virtual Machines |
US20140281030A1 (en) | 2013-03-15 | 2014-09-18 | Vmware, Inc. | Virtual Network Flow Monitoring |
US20160050117A1 (en) | 2013-03-19 | 2016-02-18 | Yale University | Managing network forwarding configurations using algorithmic policies |
US20140297780A1 (en) | 2013-03-26 | 2014-10-02 | Vmware, Inc. | Method and system for vm-granular ssd/flash cache live migration |
US20160050141A1 (en) | 2013-04-28 | 2016-02-18 | Huawei Technologies Co., Ltd. | Traffic Classifier, Service Routing Trigger, and Packet Processing Method and System |
US20140325037A1 (en) | 2013-04-29 | 2014-10-30 | Amazon Technologies, Inc. | Automated Creation of Private Virtual Networks in a Service Provider Network |
US20160149863A1 (en) | 2013-06-25 | 2016-05-26 | Ditno. Pty Ltd | Method and system for managing a host-based firewall |
US20150052521A1 (en) | 2013-08-13 | 2015-02-19 | Vmware, Inc. | Method and system for migration of virtual machines and virtual applications between cloud-computing facilities and subsequently permanently relocating migrated virtual machines and virtual applications |
US20150095970A1 (en) | 2013-10-01 | 2015-04-02 | Codeproof Technologies, Inc. | Mobile device management as a simplified online software service |
US20150112933A1 (en) | 2013-10-18 | 2015-04-23 | Cisco Technology, Inc. | System and method for software defined network aware data replication |
US20150193466A1 (en) | 2014-01-06 | 2015-07-09 | Siegfried Luft | Architecture and method for cloud provider selection and projection |
US20150200816A1 (en) | 2014-01-10 | 2015-07-16 | Facebook, Inc. | Policy performance ordering |
US20170134422A1 (en) | 2014-02-11 | 2017-05-11 | Varmour Networks, Inc. | Deception Techniques Using Policy |
US20150237013A1 (en) | 2014-02-20 | 2015-08-20 | Nicira, Inc. | Specifying point of enforcement in a firewall rule |
US20150237014A1 (en) | 2014-02-20 | 2015-08-20 | Nicira, Inc. | Method and apparatus for distributing firewall rules |
US20210409453A1 (en) | 2014-02-20 | 2021-12-30 | Nicira, Inc. | Method and apparatus for distributing firewall rules |
US20190207983A1 (en) | 2014-02-20 | 2019-07-04 | Nicira, Inc. | Method and apparatus for distributing firewall rules |
US9215214B2 (en) | 2014-02-20 | 2015-12-15 | Nicira, Inc. | Provisioning firewall rules on a firewall enforcing device |
US20150237015A1 (en) | 2014-02-20 | 2015-08-20 | Nicira, Inc. | Provisioning firewall rules on a firewall enforcing device |
US10264021B2 (en) | 2014-02-20 | 2019-04-16 | Nicira, Inc. | Method and apparatus for distributing firewall rules |
US20160191570A1 (en) | 2014-02-20 | 2016-06-30 | Nicira, Inc. | Method and apparatus for distributing firewall rules |
US9276904B2 (en) | 2014-02-20 | 2016-03-01 | Nicira, Inc. | Specifying point of enforcement in a firewall rule |
US9215213B2 (en) | 2014-02-20 | 2015-12-15 | Nicira, Inc. | Method and apparatus for distributing firewall rules |
US11122085B2 (en) | 2014-02-20 | 2021-09-14 | Nicira, Inc. | Method and apparatus for distributing firewall rules |
US20150277949A1 (en) | 2014-03-27 | 2015-10-01 | Thiam Wah Loh | Securing shared interconnect for virtual machine |
US9215210B2 (en) | 2014-03-31 | 2015-12-15 | Nicira, Inc. | Migrating firewall connection state for a firewall service virtual machine |
US20160241702A1 (en) | 2014-05-29 | 2016-08-18 | Fortinet, Inc. | Management of wireless access points via virtualization |
US9774707B2 (en) | 2014-06-04 | 2017-09-26 | Nicira, Inc. | Efficient packet classification for dynamic containers |
US20160065627A1 (en) | 2014-08-29 | 2016-03-03 | Box, Inc. | Configurable metadata-based automation and content classification architecture for cloud-based collaboration platforms |
US20170250869A1 (en) | 2014-09-12 | 2017-08-31 | Andreas Richard Voellmy | Managing network forwarding configurations using algorithmic policies |
US20160094456A1 (en) | 2014-09-30 | 2016-03-31 | Nicira, Inc. | Method and apparatus for distributing load among a plurality of service nodes |
US9774537B2 (en) | 2014-09-30 | 2017-09-26 | Nicira, Inc. | Dynamically adjusting load balancing |
US20160094643A1 (en) | 2014-09-30 | 2016-03-31 | Nicira, Inc. | Dynamically adjusting load balancing |
US20160105333A1 (en) | 2014-10-10 | 2016-04-14 | Nicira, Inc. | Logical network traffic analysis |
US20160156591A1 (en) | 2014-12-02 | 2016-06-02 | Nicira, Inc. | Context-aware distributed firewall |
US20160182454A1 (en) | 2014-12-22 | 2016-06-23 | Edgecast Networks, Inc. | Real-Time Reconfigurable Web Application Firewall For a Distributed Platform |
US20160191466A1 (en) | 2014-12-30 | 2016-06-30 | Fortinet, Inc. | Dynamically optimized security policy management |
US9553806B2 (en) | 2015-02-06 | 2017-01-24 | Telefonaktiebolaget L M Ericsson (Publ) | Method and system for supporting port ranging in a software-defined networking (SDN) system |
US20170005867A1 (en) | 2015-06-30 | 2017-01-05 | Nicira, Inc. | Providing firewall rules for workload spread across multiple data centers |
US9680706B2 (en) | 2015-06-30 | 2017-06-13 | Nicira, Inc. | Federated firewall management for moving workload across data centers |
US11115382B2 (en) | 2015-06-30 | 2021-09-07 | Nicira, Inc. | Global objects for federated firewall rule management |
US20170005987A1 (en) | 2015-06-30 | 2017-01-05 | Nicira, Inc. | Federated firewall management for moving workload across data centers |
US20170005988A1 (en) | 2015-06-30 | 2017-01-05 | Nicira, Inc. | Global objects for federated firewall rule management |
US20170004192A1 (en) | 2015-06-30 | 2017-01-05 | Nicira, Inc. | Replicating firewall policy across multiple data centers |
US9755903B2 (en) | 2015-06-30 | 2017-09-05 | Nicira, Inc. | Replicating firewall policy across multiple data centers |
US11128600B2 (en) | 2015-06-30 | 2021-09-21 | Nicira, Inc. | Global object definition and management for distributed firewalls |
US20170104720A1 (en) | 2015-06-30 | 2017-04-13 | Nicira, Inc. | Global object definition and management for distributed firewalls |
US9806948B2 (en) | 2015-06-30 | 2017-10-31 | Nicira, Inc. | Providing firewall rules for workload spread across multiple data centers |
US20170026283A1 (en) | 2015-07-24 | 2017-01-26 | International Business Machines Corporation | Adding multi-tenant awareness to a network packet processing device on a Software Defined Network (SDN) |
US10701104B2 (en) * | 2015-08-18 | 2020-06-30 | Acronis International Gmbh | Agentless security of virtual machines using a network interface controller |
US9860279B2 (en) | 2015-08-28 | 2018-01-02 | Nicira, Inc. | Defining network rules based on remote device management attributes |
US20170064749A1 (en) | 2015-08-28 | 2017-03-02 | Nicira, Inc. | Associating Service Tags with Remote Data Message Flows Based on Remote Device Management Attributes |
US9894103B2 (en) | 2015-08-28 | 2018-02-13 | Nicira, Inc. | Performing source network address translation based on remote device management attributes |
US9906561B2 (en) | 2015-08-28 | 2018-02-27 | Nicira, Inc. | Performing logical segmentation based on remote device attributes |
US9906562B2 (en) | 2015-08-28 | 2018-02-27 | Nicira, Inc. | Associating service tags with remote data message flows based on remote device management attributes |
US9906560B2 (en) | 2015-08-28 | 2018-02-27 | Nicira, Inc. | Distributing remote device management attributes to service nodes for service rule processing |
US20170118173A1 (en) | 2015-10-23 | 2017-04-27 | Attala Systems, LLC | Distributed firewalls and virtual network services using network packets with security tags |
US20170171362A1 (en) | 2015-12-15 | 2017-06-15 | Intel Corporation | High speed flexible packet classification using network processors |
US20170180320A1 (en) | 2015-12-18 | 2017-06-22 | Nicira, Inc. | Creating and distributing template based service rules |
US20170180423A1 (en) | 2015-12-18 | 2017-06-22 | Nicira, Inc. | Service rule console for creating, viewing and updating template based service rules |
US20170180319A1 (en) | 2015-12-18 | 2017-06-22 | Nicira, Inc. | Datapath processing of service rules with qualifiers defined in terms of template identifiers and/or template matching criteria |
US10148696B2 (en) | 2015-12-18 | 2018-12-04 | Nicira, Inc. | Service rule console for creating, viewing and updating template based service rules |
US20170180321A1 (en) | 2015-12-18 | 2017-06-22 | Nicira, Inc. | Datapath processing of service rules with qualifiers defined in terms of dynamic groups |
US20160112374A1 (en) | 2015-12-30 | 2016-04-21 | Iomaxis, Inc | Method and system for securing and protecting smart devices within the internet of things ecosystem |
US20170317976A1 (en) | 2016-04-29 | 2017-11-02 | Nicira, Inc. | Priority Allocation for Distributed Service Rules |
US10135727B2 (en) | 2016-04-29 | 2018-11-20 | Nicira, Inc. | Address grouping for distributed service rules |
US20170317928A1 (en) | 2016-04-29 | 2017-11-02 | Nicira, Inc. | Address Grouping for Distributed Service Rules |
US10348685B2 (en) | 2016-04-29 | 2019-07-09 | Nicira, Inc. | Priority allocation for distributed service rules |
US20190319925A1 (en) | 2016-04-29 | 2019-10-17 | Nicira, Inc. | Priority allocation for distributed service rules |
US11005815B2 (en) | 2016-04-29 | 2021-05-11 | Nicira, Inc. | Priority allocation for distributed service rules |
US20170317977A1 (en) | 2016-05-01 | 2017-11-02 | Nicira, Inc. | Fast ordering of firewall sections and rules |
US11171920B2 (en) | 2016-05-01 | 2021-11-09 | Nicira, Inc. | Publication of firewall configuration |
US11425095B2 (en) | 2016-05-01 | 2022-08-23 | Nicira, Inc. | Fast ordering of firewall sections and rules |
US10944722B2 (en) | 2016-05-01 | 2021-03-09 | Nicira, Inc. | Using activities to manage multi-tenant firewall configuration |
US20170317979A1 (en) | 2016-05-01 | 2017-11-02 | Nicira, Inc. | Publication of Firewall Configuration |
US20170318055A1 (en) | 2016-05-01 | 2017-11-02 | Nicira, Inc. | Using activities to manage multi-tenant firewall configuration |
US11088990B2 (en) | 2016-06-29 | 2021-08-10 | Nicira, Inc. | Translation cache for firewall configuration |
US11082400B2 (en) | 2016-06-29 | 2021-08-03 | Nicira, Inc. | Firewall configuration versioning |
US20180007000A1 (en) | 2016-06-29 | 2018-01-04 | Nicira, Inc. | Translation Cache for Firewall Configuration |
US20180007007A1 (en) | 2016-06-29 | 2018-01-04 | Nicira, Inc. | Self-service firewall configuration |
US11258761B2 (en) | 2016-06-29 | 2022-02-22 | Nicira, Inc. | Self-service firewall configuration |
US20180007008A1 (en) | 2016-06-29 | 2018-01-04 | Nicira, Inc. | Firewall Configuration Versioning |
US20190182213A1 (en) * | 2017-12-13 | 2019-06-13 | Teloip Inc. | System, apparatus and method for providing a unified firewall manager |
US20200296078A1 (en) | 2019-03-13 | 2020-09-17 | Vmware, Inc. | Sharing of firewall rules among multiple workloads in a hypervisor |
US11310202B2 (en) | 2019-03-13 | 2022-04-19 | Vmware, Inc. | Sharing of firewall rules among multiple workloads in a hypervisor |
Non-Patent Citations (20)
Title |
---|
Author Unknown, "AppLogic Features," Jul. 2007, 2 pages, 3TERA, Inc. |
Author Unknown, "CISCO Identity-Based Firewall Security," Month Unknown 2011, 2 pages, CISCO Systems, Inc. |
Author Unknown, "Enabling Service Chaining on Cisco Nexus 1000V Series," Month Unknown, 2012, 25 pages, CISCO. |
Author Unknown, "Next-Generation Firewalls," Month Unknown 2013, 1 page, Palo Alto Networks. |
Basak, Debashis, et al., "Virtualizing Networking and Security in the Cloud," Month Unknown 2010, 9 pages, VMware, Inc., Palo Alto, CA. |
Casado, Martin, et al., "SANE: A Protection Architecture for Enterprise Networks," Proceedings of the 15th USENIX Security Symposium, Jul. 31-Aug. 4, 2006, 15 pages, USENIX, Vancouver, Canada. |
Dixon, Colin, et al., "An End to the Middle," Proceedings of the 12th Conference on Hot Topics in Operating Systems, May 2009, 5 pages, USENIX Association, Berkeley, CA, USA. |
Dumitriu, Dan Mihai, et al., (U.S. Appl. No. 61/514,990), filed Aug. 4, 2011, 31 pages. |
Guichard, J., et al., "Network Service Chaining Problem Statement," Network Working Group, Jun. 13, 2013, 14 pages, Cisco Systems, Inc. |
Haim, Roie Ben, "NSX Distributed Firewall Deep Dive," Route to Cloud, Apr. 30, 2015, 52 pages. |
Herndon, Joseph, "FairWarning IP, LLC v. Iatric Systems, Inc. (Fed. Cir. 2016)," Oct. 13, 2016, 3 pages. |
Ioannidis, Sotiris, et al., "Implementing a Distributed Firewall," CCS '00, Month Unknown 2000, 10 pages, ACM, Athens, Greece. |
Joseph, Dilip Anthony, et al., "A Policy-aware Switching Layer for Data Centers," Jun. 24, 2008, 26 pages, Electrical Engineering and Computer Sciences, University of California, Berkeley, CA, USA. |
Mayer, Alain, et al., "Offline Firewall Analysis," International Journal of information Security, Jun. 16, 2005, 20 pages, vol. 5, Issue 3, Springer-Verlag. |
Scarfone, Karen, et al., "Guidelines on Firewalls and Firewall Policy: Recommendations of the National Institute of Standards and Technology," Special Publication 800-41, Revision 1, Sep. 2009, 48 pages, NIST, U.S. Department of Commerce. |
Sekar, Vyas, et al., "Design and Implementation of a Consolidated Middlebox Architecture," 9th USENIX Symposium on Networked Systems Design and Implementation, Apr. 25-27, 2012, 14 pages, USENIX, San Jose, CA, USA. |
Sherry, Justine, et al., "Making Middleboxes Someone Else's Problem: Network Processing as a Cloud Service," In Proc. of SIGCOMM '12, Aug. 13-17, 2012, 12 pages, Helsinki, Finland. |
Stojanovski, Nenad, et al., "Analysis of Identity Based Firewall Systems," Jun. 2010, 9 pages. |
Stojanovski, Nenad, et al., "Architecture Of A Identity Based Firewall System," Jul. 2011, 9 pages. |
Thames, J. Lane, et al., "A Distributed Firewall and Active Response Architecture Providing Preemptive Protection," ACM-SE '08, Mar. 28-29, 2008, 6 pages, Auburn, AL, USA. |
Also Published As
Publication number | Publication date |
---|---|
US20220239635A1 (en) | 2022-07-28 |
US11310202B2 (en) | 2022-04-19 |
US20200296078A1 (en) | 2020-09-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11500670B2 (en) | Computing service with configurable virtualization control levels and accelerated launches | |
US10680946B2 (en) | Adding multi-tenant awareness to a network packet processing device on a software defined network (SDN) | |
US11354039B2 (en) | Tenant-level sharding of disks with tenant-specific storage modules to enable policies per tenant in a distributed storage system | |
US11755349B2 (en) | Secure digital workspace using machine learning and microsegmentation | |
US10135726B2 (en) | Virtualization port layer including physical switch port and logical switch port | |
US9992113B2 (en) | Virtual network interface controller performance using physical network interface controller receive side scaling offloads | |
US20170344291A1 (en) | Provisioning data volumes for containers running in virtual machines in which storage for the virtual machines are backed by heterogeneous storage devices | |
US11210121B2 (en) | Management of advanced connection state during migration | |
US11924167B2 (en) | Remote session based micro-segmentation | |
US20230262111A1 (en) | Peripheral device enabling virtualized computing service extensions | |
US11470119B2 (en) | Native tag-based configuration for workloads in a virtual computing environment | |
US12058108B2 (en) | Sharing of firewall rules among multiple workloads in a hypervisor | |
US10050874B2 (en) | Media access control address learning for packets | |
US20220276886A1 (en) | Computer device including process isolated containers with assigned virtual functions | |
US20160057210A1 (en) | Application profile to configure and manage a software defined environment | |
US20190364047A1 (en) | Methods to restrict network file access in guest virtual machines using in-guest agents | |
CN107547258B (en) | Method and device for realizing network policy | |
US11483284B2 (en) | Recommending network NANO-segmentation for micro-services using flow analysis | |
US10552195B2 (en) | Migration of virtual infrastructures | |
EP4309039A1 (en) | Memory operations management in computing systems | |
US11748142B2 (en) | High-availability admission control for accelerator devices | |
US20240241971A1 (en) | Transforming a hierarchical permissions model to a linear permissions model using a category approach | |
US12045463B2 (en) | Controlling access to resources during transition to a secure storage system | |
US20240205191A1 (en) | Security policy enforcement for additional instances of an application | |
US20200034190A1 (en) | Live migration of virtual machines between heterogeneous virtualized computing environments |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
AS | Assignment |
Owner name: VMWARE LLC, CALIFORNIA Free format text: CHANGE OF NAME;ASSIGNOR:VMWARE, INC.;REEL/FRAME:066692/0103 Effective date: 20231121 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
ZAAA | Notice of allowance and fees due |
Free format text: ORIGINAL CODE: NOA |
|
ZAAB | Notice of allowance mailed |
Free format text: ORIGINAL CODE: MN/=. |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |